An adversary gains physical access to a system or device through theft of the item. Possession of a system or device enables a number of unique attacks to be executed and often provides the adversary with an extended timeframe for which to perform an attack. Most protections put in place to secure sensitive information can be defeated when an adversary has physical access and enough time.
|
|
| ID | CAPEC-507 |
| Latest Sync Date | 11/05/25 15:15:38 |
| Original ID | 507 |
| Abstraction | Meta |
| Status | Draft |
| Alternate Terms | |
| Likelihood Of Attack | |
| Typical Severity | |
| Related Attack Patterns | |
| Execution Flow | |
| Prerequisites | ::This type of attack requires the existence of a physical target that an adversary believes hosts something of value.:: |
| Skills Required | |
| Resources Required | |
| Indicators | |
| Consequences | |
| Mitigations | ::To mitigate this type of attack, physical security techniques such as locks doors, alarms, and monitoring of targets should be implemented.:: |
| Example Instances | |
| Related Weaknesses | |
| Taxonomy Mappings | |
| Notes | |